CVE-2025-38342 — Out-of-bounds Read in Linux
Severity
7.1HIGHNVD
OSV5.6OSV3.2
EPSS
0.0%
top 93.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 10
Latest updateMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
software node: Correct a OOB check in software_node_get_reference_args()
software_node_get_reference_args() wants to get @index-th element, so
the property value requires at least '(index + 1) * sizeof(*ref)' bytes
but that can not be guaranteed by current OOB check, and may cause OOB
for malformed property.
Fix by using as OOB check '((index + 1) * sizeof(*ref) > prop->length)'.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2
Affected Packages4 packages
▶CVEListV5linux/linux59abd83672f70cac4b6bf9b237506c5bc6837606 — 142acd739eb6f08c148a96ae8309256f1422ff4b+7
Also affects: Debian Linux 11.0